Dear Editors,

attached you find two ProtoXEPs submissions, OpenPGP for XMPP (OX) and
OpenPGP for XMPP Instant Messaging (OX-IM), to the XSF standards track
with the hope that they will be approved by the XSF Council as
experimental XEPs.

At some stage while developing a new OpenPGP specification for XMPP we
found that it was necessary to split the XEP into two: OX and OX-IM. OX
acts as basic building block for other XEPs, like OX-IM, which (will)
define a specific profile for OX. The OX-IM profile addresses the use
case of securing Instant Messaging communication via OpenPGP. Future
XEPs may define other profiles, thus re-using the components provided by
OX, to enable OpenPGP usage for the various scenarios (IoT, M2M
communication, ...) where XMPP is used.

The XEPs are developed in a git repository available at

https://github.com/flowdalic/xeps

HTML rendered versions can be found at

http://geekplace.eu/xeps

Best
 Florian    Dominik      Vincent
 Schmaus    Schürmann    Breitmoser
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE xep SYSTEM 'xep.dtd' [
  <!ENTITY signcrypt "&lt;signcrypt/&gt;">
  <!ENTITY sign "&lt;sign/&gt;">
  <!ENTITY crypt "&lt;crypt/&gt;">
  <!ENTITY openpgp "&lt;openpgp/&gt;">
  <!ENTITY payload "&lt;payload/&gt;">
  <!ENTITY rfc3156 "<span class='ref'><link url='http://tools.ietf.org/html/rfc3156'>RFC 3156</link></span> <note>RFC 3156: MIME Security with OpenPGP &lt;<link url='http://tools.ietf.org/html/rfc3156'>http://tools.ietf.org/html/rfc3156</link>&gt;.</note>" >
  <!ENTITY rfc3629 "<span class='ref'><link url='http://tools.ietf.org/html/rfc3629'>RFC 3629</link></span> <note>RFC 3629: UTF-8, a transformation format of ISO 10646 &lt;<link url='http://tools.ietf.org/html/rfc3629'>http://tools.ietf.org/html/rfc3629</link>&gt;.</note>" >
  <!ENTITY % ents SYSTEM 'xep.ent'>
%ents;
]>
<?xml-stylesheet type='text/xsl' href='xep.xsl'?>
<xep>
<header>
  <title>OpenPGP for XMPP</title>
  <abstract>Specifies end-to-end encryption and authentication of data with the help of
  OpenPGP, announcement, discovery and retrieval of public keys and a
  mechanism to synchronize secret keys over multiple
  devices.</abstract>
  <legal>
    <copyright>This XMPP Extension Protocol is copyright (c) 1999 - 2016 by the XMPP Standards Foundation (XSF).</copyright>
    <permissions>Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the &quot;Specification&quot;), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specification, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or substantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or publisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP 
Standards Foundation.</permissions>
    <warranty>## NOTE WELL: This Specification is provided on an &quot;AS IS&quot; BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. In no event shall the XMPP Standards Foundation or the authors of this Specification be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the Specification or the implementation, deployment, or other use of the Specification. ##</warranty>
    <liability>In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall the XMPP Standards Foundation or any author of this Specification be liable for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising out of the use or inability to use the Specification (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if the XMPP Standards Foundation or such author has been advised of the possibility of such damages.</liability>
    <conformance>This XMPP Extension Protocol has been contributed in full conformance with the XSF's Intellectual Property Rights Policy (a copy of which may be found at &lt;<link url='http://xmpp.org/extensions/ipr-policy.shtml'>http://xmpp.org/extensions/ipr-policy.shtml</link>&gt; or obtained by writing to XSF, P.O. Box 1641, Denver, CO 80201 USA).</conformance>
  </legal>
  <number>xxxx</number>
  <status>ProtoXEP</status>
  <type>Standards Track</type>
  <sig>Standards</sig>
  <approver>Council</approver>
  <dependencies>
    <spec>XMPP Core</spec>
    <spec>XEP-0030</spec>
    <spec>XEP-0082</spec>
    <spec>XEP-0163</spec>
    <spec>XEP-0223</spec>
    <spec>XEP-0334</spec>
  </dependencies>
  <supersedes/>
  <supersededby/>
  <shortname>ox</shortname>
  <author>
    <firstname>Florian</firstname>
    <surname>Schmaus</surname>
    <email>[email protected]</email>
    <jid>[email protected]</jid>
  </author>
  <author>
    <firstname>Dominik</firstname>
    <surname>Schürmann</surname>
    <email>[email protected]</email>
    <jid>[email protected]</jid>
  </author>
  <author>
    <firstname>Vincent</firstname>
    <surname>Breitmoser</surname>
    <email>[email protected]</email>
    <jid>[email protected]</jid>
  </author>
  <revision>
    <version>0.0.1alpha2</version>
    <date>2016-03-25</date>
    <initials>fs</initials>
    <remark><p>First draft.</p></remark>
  </revision>
</header>

<section1 topic='Introduction' anchor='intro'>

  <p>This XMPP extension protocol specifies the foundations of
  end-to-end encryption and authentication, based on digital
  signatures, of data with the help of OpenPGP. Additional XEPs will
  use this extension protocol as building block when specifying their
  own OpenPGP profile suiting their use case. One such profile is the
  Instant Messaging Profile specified in <link
  url='../xep-openpgp-im/xep-openpgp-im.html'>XEP-OXIM: OpenPGP for
  XMPP Instant Messaging</link>.</p>

  <p>XMPP provides the mechanisms to solve a lot of issues that come
  with modern day OpenPGP usage. For example, based on &xep0163; this
  specification describes a standardized way to discover OpenPGP
  public keys of other entities. But unlike the OpenPGP keyservers,
  this process establishes a strong relation between the key and the
  key's owning entity (usually a human user). A similar mechanism
  described herein allows to synchronize the secret key(s) across
  multiple devices.</p>

  <p>OpenPGP in return allows for end-to-end encrypted data to be
  exchanged between one, two or even multiple entities
  (multi-end-to-multi-end encryption). Therefore this XEP can be used
  for example to implement end-to-end encrypted &xep0045;.</p>

</section1>

<section1 topic='Glossary' anchor='glossary'>

  <dl>
    <di><dt>OpenPGP element</dt><dd>An XMPP extension element: &openpgp; qualified by the 'urn:xmpp:openpgp:0' namespace</dd></di>
    <di><dt>OpenPGP content element</dt><dd>An element embedded via OpenPGP in a &openpgp; element. Either one of &signcrypt;, &sign; or &crypt;, qualified by the 'urn:xmpp:openpgp:0' namespace.</dd></di>
    <di><dt>PEP</dt><dd>Personal Eventing Protocol (XEP-0163)</dd></di>
    <di><dt>Public key PEP node</dt><dd>A PEP node containing an entity's public OpenPGP key.</dd></di>
    <di><dt>Secret key PEP node</dt><dd>A PEP node containing an entity's encrypted secret OpenPGP key.</dd></di>
  </dl>

</section1>

<section1 topic='OpenPGP Encrypted and Signed Data' anchor='signcrypt'>

  <section2 topic='Exchanging OpenPGP Encrypted and Signed Data' anchor='exchange'>

    <p>The &openpgp; extension element qualified by the
    'urn:xmpp:openpgp:0' namespace is used in order to exchange
    encrypted and signed data.</p>

    <example caption='The &openpgp; extension within a message.'><![CDATA[
<message to='[email protected]'>
  <openpgp xmlns='urn:xmpp:openpgp:0'>
    BASE64_OPENPGP_MESSAGE
  </openpgp>
</message>]]></example>

    <p>The text content of &openpgp; ("BASE64_OPENPGP_MESSAGE") is a
    Base64 encoded (&rfc4648; <link
    url='https://tools.ietf.org/html/rfc4648#section-4'>§ 4</link>)
    OpenPGP message as specified in &rfc4880; which contains an
    encrypted and/or signed UTF-8 (&rfc3629;) encoded string. This
    string MUST correspond to exactly one OpenPGP content element,
    that is, it represents either a &signcrypt;, a &sign; or a &crypt;
    extension element qualified by the 'urn:xmpp:openpgp:0'
    namespace. Note that OpenPGP's ASCII Armor is not used, instead
    the XMPP client MUST encode the raw bytes of OpenPGP message using
    Base64.</p>

    <p>In case of a &signcrypt; element, the OpenPGP message embedded
    in the &openpgp; element MUST be encrypted and signed, and SHOULD
    also be encrypted to self. In case of a &sign; element, the
    OpenPGP message MUST be signed and MUST NOT be encrypted. In case
    of &crypt; the OpenPGP message MUST NOT be signed, but MUST be
    encrypted.</p>

    <example caption='The &signcrypt; extension element.'><![CDATA[
<signcrypt xmlns='urn:xmpp:openpgp:0'>
  <to jid='[email protected]'/>
  <time stamp='2014-07-10T17:06:00+02:00'/>
  <rpad>
    f0rm1l4n4-mT8y33j!Y%fRSrcd^ZE4Q7VDt1L%WEgR!kv
  </rpad>
  <payload>
    <body xmlns='jabber:client'>
      This is a secret message.
    </body>
  </payload>
</signcrypt>]]></example>

    <p>OpenPGP content elements MUST possess exactly one 'time'
    element as direct child elements. The &signcrypt; and &crypt;
    content elements MUST contain at least one 'to' element(s), which
    MUST have a 'jid' attribute containing the intended recipient's
    XMPP address of the signed and/or encrypted data to prevent
    Surreptitious Forward Attacks<note>Jee Hea An, Yevgeniy Dodis, and
    Tal Rabin. 2002. On the Security of Joint Signature and
    Encryption. In Proceedings of the International Conference on the
    Theory and Applications of Cryptographic Techniques: Advances in
    Cryptology (EUROCRYPT '02), Lars R. Knudsen
    (Ed.). Springer-Verlag, London, UK, UK, 83-107. &lt;<link
    url='https://www.iacr.org/archive/eurocrypt2002/23320080/adr.pdf'>https://www.iacr.org/archive/eurocrypt2002/23320080/adr.pdf</link>&gt;</note>.
    The XMPP address found in the 'to' element's 'jid' attribute
    SHOULD be without Resourcepart (i.e. a bare JID). A &sign; content
    element may not carry a 'to' attribute. The 'time' element MUST
    have a 'stamp' attribute which contains the timestamp when the
    OpenPGP content element was signed and/or encrypted in the
    DateTime format as specified in &xep0082; § 3.2. The &signcrypt;
    and &crypt; elements SHOULD furthermore contain a 'rpad' element
    which text content is a random-length random-content padding.</p>

    <table caption='OpenPGP Content Element Properties'>
      <tr>
        <th>Content Element</th>
        <th>'to' Attribute</th>
        <th>'time' Attribute</th>
        <th>&lt;rpad/&gt; Element</th>
        <th>&lt;payload/&gt; Element</th>
      </tr>
      <tr>
        <td>&signcrypt;</td>
        <td>MUST have at least one</td>
        <td>MUST have exactly one</td>
        <td>SHOULD have exaclty one</td>
        <td>MUST have exactly one</td>
      </tr>
      <tr>
        <td>&sign;</td>
        <td>MAY NOT contain one</td>
        <td>MUST have exaclty one</td>
        <td>NOT REQUIRED</td>
        <td>MUST have exactly one</td>
      </tr>
      <tr>
        <td>&crypt;</td>
        <td>MUST have at least one</td>
        <td>MUST have exaclty one</td>
        <td>SHOULD have exaclty one</td>
        <td>MUST have exactly one</td>
      </tr>
    </table>

    <p>OpenPGP content elements MUST possess exactly one &payload;
    element. The child elements of &payload; can be seen as OpenPGP
    secured Stanza extension elements which are encrypted and/or
    signed. After the &openpgp; element and the including &signcrypt;,
    &sign; or &crypt; element was verified, they are processed
    according to the specification of the relevant OpenPGP for XMPP
    profile (see for example XEP-OXIM).</p>

  </section2>

  <section2 topic='Verification of &openpgp; Content' anchor='openpgp-verification'>

    <p>Recipients MUST verify that the signature is valid, that the
    signature's key corresponds to the sender's key, and that the
    sender's key has a User ID containing the sender's XMPP
    address in the form "xmpp:[email protected]" (for details see
    <link url='#openpgp-user-ids'>"OpenPGP User IDs"</link>). Thus,
    the recipient may
    need to retrieve the key from the Personal Eventing Protocol node
    as described above. At least one of the XMPP addresses found in
    the 'to' elements contained in OpenPGP content element MUST
    correspond to the outer 'to' of the XMPP &MESSAGE;. Furthermore,
    recipients are RECOMMENDED to verify the 'time' element for
    plausibility or to display it to a user for verification.</p>

  </section2>

</section1>

<section1 topic='Announcing and Discovering the Public Key via PEP' anchor='announcing-discover-pubkey'>

  <p>Parties interested in exchanging encrypted data between each
  other via OpenPGP need to know the public key(s) of the
  recipients. The following section specifies a mechanism to announce
  and discover public keys.</p>

  <section2 topic='Announcing the Public Key via PEP' anchor='annoucning-pubkey'>

    <p>In order to announce the public key, the client needs to store
    it in a PEP node. The public key data, as specified in <cite>RFC
    4880</cite>, is stored within a &lt;pubkey/&gt; element which is a
    child element of the &lt;pubkeys/&gt; element qualified by the
    'urn:xmpp:openpgp:0' namespace. Note that OpenPGP's ASCII Armor is
    not used, instead the XMPP client MUST encode the public key using
    Base64. Client SHOULD only try to store the public key if the
    Personal Eventing Protocol service supports persistent-items, thus
    it SHOULD check if the service reports the
    'http://jabber.org/protocol/pubsub#persistent-items' feature.</p>

    <example caption='Saving the public key in the PEP node.'><![CDATA[
<iq from='[email protected]/balcony' type='set' id='1'>
  <pubsub xmlns='http://jabber.org/protocol/pubsub'>
     <publish node='urn:xmpp:openpgp:0'>
        <item>
          <pubkeys xmlns='urn:xmpp:openpgp:0'>
            <pubkey>
              BASE64_OPENPGP_PUBLIC_KEY
            </pubkey>
          </pubkeys>
         </item>
      </publish>
    </pubsub>
</iq>]]></example>

  </section2>

  <section2 topic='Discovering the Public Key via PEP' anchor='discover-pubkey'>

    <p>In order to discover the public key of an XMPP entity, clients
    send a PubSub &IQ; request to the entity's bare JID of which it
    wants to know the public key.</p>

    <example caption='Requesting a OpenPGP public key from an XMPP entity.'><![CDATA[
<iq from='[email protected]/orchard'
    to='[email protected]'
    type='get'
    id='getpub'>
  <pubsub xmlns='http://jabber.org/protocol/pubsub'>
    <items node='urn:xmpp:openpgp:0'
           max_items='1'/>
  </pubsub>
</iq>]]></example>
    <example caption='Personal Eventing Protocol result containing the requested public key.'><![CDATA[
<iq from='[email protected]'
    to='[email protected]/orchard'
    type='result'
    id='getpub'>
  <pubsub xmlns='http://jabber.org/protocol/pubsub'>
    <publish node='urn:xmpp:openpgp:0'>
      <item>
        <pubkeys xmlns='urn:xmpp:openpgp:0'>
          <pubkey>
            BASE64_OPENPGP_PUBLIC_KEY
          </pubkey>
        </pubkeys>
      </item>
    </publish>
  </pubsub>
  </iq>]]></example>

    <p>Note that the result may contain multiple pubkey elements. Only
    the public keys found in the most recent MUST be used. Requesters
    may want to limit the results to the most recent item using the
    'max_items' attribute set to '1'. Clients could alternatively use
    &xep0059; as an alternative to 'max_items' but accoding to
    <cite>XEP-0060</cite> RSM is not (yet) mandatory for PubSub
    services.</p>

    <p>Some XMPP services may not provide the Personal Eventing
    Protocol feature required to provide the mechanism described
    here. If so, they will return an &IQ; error of type
    service-unavailable.</p>

  </section2>

</section1>

<section1 topic='Synchronizing the Secret Key with a Private PEP Node' anchor='synchro-pep'>

    <p>A private PEP node is used to allow XMPP clients to synchronize
    the user's secret OpenPGP key. Where private PEP node is defined: A
    PEP node in whitelist mode where only the bare JID of the key
    owner is whitelisted as described in &xep0223;. The secret key is
    additionally encrypted.</p>

    <section2 topic='Required PEP features'>

      <p>The used PEP server MUST support PEP and the whitelist access
      model. It SHOULD also support persistent items.</p>

        <section3 topic='Discovering support'>

          <example caption='Account owner queries server regarding protocol support'><![CDATA[
<iq from='[email protected]/balcony'
    to='[email protected]'
    id='disco1'
    type='get'>
  <query xmlns='http://jabber.org/protocol/disco#info'/>
</iq>
]]></example>

        <p>The service discovery result must contain a PEP identity
        '&lt;identity category='pubsub' type='pep'/&gt;, and the
        'http://jabber.org/protocol/pubsub#access-whitelist'
        feature. Ideally it also contains the
        'http://jabber.org/protocol/pubsub#persistent-items'
        feature</p>

        <example caption='Server communicates protocol support'><![CDATA[
<iq from='[email protected]'
    to='[email protected]/balcony'
    id='disco1'
    type='result'>
  <query xmlns='http://jabber.org/protocol/disco#info'>
    <identity category='account' type='registered'/>
    <identity category='pubsub' type='pep'/>
    <feature var='http://jabber.org/protocol/pubsub#access-presence'/>
    <feature var='http://jabber.org/protocol/pubsub#auto-create'/>
    <feature var='http://jabber.org/protocol/pubsub#auto-subscribe'/>
    <feature var='http://jabber.org/protocol/pubsub#config-node'/>
    <feature var='http://jabber.org/protocol/pubsub#create-and-configure'/>
    <feature var='http://jabber.org/protocol/pubsub#create-nodes'/>
    <feature var='http://jabber.org/protocol/pubsub#filtered-notifications'/>
    <feature var='http://jabber.org/protocol/pubsub#persistent-items'/>
    <feature var='http://jabber.org/protocol/pubsub#publish'/>
    <feature var='http://jabber.org/protocol/pubsub#retrieve-items'/>
    <feature var='http://jabber.org/protocol/pubsub#subscribe'/>
    ...
  </query>
</iq>]]></example>

       </section3>

    </section2>

    <section2 topic='Requesting Information About the Secret Key PEP Node' anchor='req-info-secret-pep-node'>

      <p>In order to synchronize the secret key over a private PEP node,
      clients first need to discover and verify the node for the correct
      settings.</p>

      <section3 topic='Client Sends Request'>

  <example caption='Requesting the user&apos;s secret key.'><![CDATA[
<iq from='[email protected]/orchard'
    to='[email protected]'
    type='get'
    id='getsecret'>
  <pubsub xmlns='http://jabber.org/protocol/pubsub'>
    <items node='urn:xmpp:openpgp:secret-key:0'
           max_items='1'/>
  </pubsub>
</iq>]]></example>

      </section3>
      <section3 topic='PEP Service Success Response'>

  <example caption='Personal Eventing Protocol result containing the requested public key.'><![CDATA[
<iq from='[email protected]'
    to='[email protected]/orchard'
    type='result'
    id='getsecret'>
  <pubsub xmlns='http://jabber.org/protocol/pubsub'>
    <publish node='urn:xmpp:openpgp:secret-key:0'>
      <item>
        <secretkey xmlns='urn:xmpp:openpgp:0'>
            BASE64_OPENPGP_ENCRYPTED_SECRET_KEY
        </secretkey>
      </item>
    </publish>
  </pubsub>
</iq>]]></example>

      </section3>
      <section3 topic='PEP Node Does Not Exist Response'>

        <p>If the node does not exist the service will return an &IQ;
        error indicating the item-not-found error condition. The
        client MUST then create it with an whitelist access model.</p>

        <example caption='Node does not exist'><![CDATA[
<iq from='[email protected]'
    to='[email protected]/orchard'
    type='error'
    id='getsecret'>
  <error type='cancel'>
    <item-not-found xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
  </error>
</iq>]]></example>

      </section3>

      <section3 topic='PEP Not Supported'>

        <p>The service will return a service-unavailable error &IQ; if
        it does not support PEP.</p>

        <example caption='Node does not exist'><![CDATA[
<iq from='[email protected]'
    to='[email protected]/orchard'
    type='error'
    id='getsecret'>
  <error type='cancel'>
    <service-unavailable xmlns='urn:ietf:params:xml:ns:xmpp-stanzas'/>
  </error>
</iq>]]></example>

      </section3>

    </section2>
    <section2 topic='Creating the Secret Key PEP Node'>

      <example caption='Client creates secret key PEP node'><![CDATA[
<iq type='set'
    from='[email protected]/balcony'
    id='create-node'>
  <pubsub xmlns='http://jabber.org/protocol/pubsub'>
    <create node='urn:xmpp:openpgp:secret-key:0'/>
    <configure>
      <x xmlns='jabber:x:data' type='submit'>
        <field var='FORM_TYPE' type='hidden'>
          <value>http://jabber.org/protocol/pubsub#node_config</value>
        </field>
        <field var='pubsub#access_model'>
          <value>whitelist</value>
        </field>
      </x>
    </configure>
  </pubsub>
</iq>]]></example>
      <example caption='Service informs requesting entity of success'><![CDATA[
<iq type='result'
    to='[email protected]/balcony'
    id='create-node'/>]]></example>

      <p>The node is now created and the only affiliated entity is the
      bare JID of the user, who created the node, with an affiliation as
      'owner'.</p>

      <p>In order to set a new secret key, clients store the encrypted
      secret key as Base64 encoded raw OpenPGP message within an
      &lt;secretkey/&gt; element qualified by the 'urn:xmpp:openpgp:0'
      namespace. These secret key backups are created as follows:</p>

      <ol>
        <li>All secret keys that should be included in the backup MUST
        be concatenated in their transferable key format (<cite>RFC
        4880</cite> <link
        url='http://tools.ietf.org/html/rfc4880#section-11.1'>§
        11.1</link>).
        </li>
        <li>A backup code is generated from secure random: The backup
        code consists of 24 upper case characters from the Latin
        alphabet and numbers without 'O' ("LATIN CAPITAL LETTER O")
        and '0' ("DIGIT ZERO") (alphabet:
        <tt>123456789ABCDEFGHIJKLMNPQRSTUVWXYZ</tt>) grouped into
        4-character chunks, e.g.,
        <tt>TWNK-KD5Y-MT3T-E1GS-DRDB-KVTW</tt>. The characters MUST be
        generated from cryptographically secure random. For example
        <link
        url='https://lwn.net/Articles/606141/'><tt>getrandom(2)</tt></link>,
        <link
        url='https://docs.oracle.com/javase/8/docs/api/java/security/SecureRandom.html'><tt>SecureRandom</tt></link>
        or <tt>/dev/urandom</tt>. More information about the
        randomness requirements for security can be found in &rfc4086;
        </li>
        <li>The whole backup code including the dashes is directly
        used as a string to encrypt the concatenated transferable keys
        as an OpenPGP message. More precisely: It is used as the
        symmetric-key for a Symmetric-Key Encrypted Session Key Packet
        according to <cite>RFC 4880</cite> <link
        url='http://tools.ietf.org/html/rfc4880#section-5.3'>§
        5.3</link>; the symmetric-key is thus 29 characters long
        including the dashes.  The encryption algorithm MUST be one of
        the standardized OpenPGP symmetric algorithms, e.g, AES-128.
        </li>
      </ol>

    </section2>

</section1>

<section1 topic='Business Rules' anchor='rules'>

  <section2 topic='OpenPGP Packet Format Version Restriction' anchor='openpgp-packet-format-version'>

    <p>Implementations of this XEP MUST generate and accept only
    version 4 (or higher) OpenPGP packets. Lower version OpenPGP
    packets are insecure in many aspects (see for example <cite>RFC
    4880</cite> <link
    url='http://tools.ietf.org/html/rfc4880#section-5.5.2'>§
    5.5.2</link>.).</p>

  </section2>

</section1>

<section1 topic='Implementors Advice' anchor='implementors-advice'>

  <section2 topic='Design Principles and Techniques' anchor='design-and-techniques'>

    <p>OpenPGP implementations have a sad history of being not very
    user-friendly which results in users either not using OpenPGP or in
    users wrongly using OpenPGP. Implementors of this XEP, and
    additional future XEPs based on this XEP, therefore should read
    <span class='ref'><link
    url='http://g10code.com/steed.html'>STEED</link></span><note>Koch,
    Werner, and Marcus Brinkman "STEED — Usable End-to-End
    Encryption", White Paper, g10 GmbH, 2011-10-17. &lt;<link
    url='http://g10code.com/steed.html'>http://g10code.com/steed.html</link>&gt;</note>
    and <span class='ref'><link
    url='https://www.cs.berkeley.edu/~tygar/papers/Why_Johnny_Cant_Encrypt/OReilly.pdf'>"Why
    Johnny can't encrypt"</link></span><note>Whitten, Alma, and
    J. Doug Tygar. "Why Johnny Can't Encrypt: A Usability Evaluation
    of PGP 5.0." Usenix Security. Vol. 1999. 1999. &lt;<link
    url='https://www.cs.berkeley.edu/~tygar/papers/Why_Johnny_Cant_Encrypt/OReilly.pdf'>https://www.cs.berkeley.edu/~tygar/papers/Why_Johnny_Cant_Encrypt/OReilly.pdf</link>&gt;</note>. Implementors
    of this XEP are encouraged to provide the concepts described in
    STEED:</p>

    <ul>
      <li>Automatic key generation</li>
      <li>Automatic key distribution</li>
      <li>Opportunistic encryption</li>
      <li>Trust upon first contact</li>
    </ul>

    <p>Furthermore implementors should design the user interface for
    effective security by following the design principles and
    techniques for security mentioned in "Why Johnny Can't
    Encrypt".</p>

  </section2>

  <section2 topic='Stanza Size' anchor='stanza-size'>

    <p>Implementors should be aware that the size OpenPGP public and
    secret keys is somewhere in the range of tens of
    kilobytes. Applying Base64 encoding on keys, as it is described
    herein, further increases the size. The formula to determine the
    Base64 encoded size is: ceil(bytes / 3) * 4. Thus the lower bound
    for the maximum stanza size of 10000 bytes, as specified in <cite>RFC
    6120</cite> § 13.12. 4., is usually exceeded. However all XMPP server
    implementations, the authors are aware of, follow the
    recommendation of the RFC and do not blindly set the maximum
    stanza size to such a low value, but use a much higher
    threshold. Therefore, this should hardly be an issue for
    implementations. Nevertheless, it is advised to keep the size of
    OpenPGP keys small by removing all signatures except the most
    recent self-signature on each User ID before exporting the key
    (cf. GnuPG's <tt>--export-options export-minimal</tt>).
    In addition, implementors are advised to handle
    &lt;policy-violation/&gt; error responses when trying to
    transmit Base64 encoded keys.</p>

  </section2>

  <section2 topic='XMPP Address Normalization' anchor='xmpp-address-normalization'>

    <!-- TODO s/6122/7622/ after https://github.com/xsf/xeps/pull/138 -->
    <p>The format of XMPP addresses, sometimes called JIDs, is well
    defined. Thus they need to be normalized, as defined in
    &rfc7622;. When implementations are required to compare XMPP
    addresses for equality, as it is the case in <link
    url='#openpgp-verification'>"Verification of &openpgp;
    Content"</link>, then they also have to compare the normalized
    versions of the addresses.</p>

  </section2>

</section1>

<section1 topic='Rationale' anchor='rationale'>

  <section2 topic='Key Handling' anchor='key-handling'>

    <p>This specification intentionally does not specify if the used
    OpenPGP key should be a primary key or a subkey. It is even
    possible to announce multiple public keys in the Personal Eventing
    Protocol node. Implementations MUST be prepared to find multiple
    public keys. The authors however believe that for ease of use only
    one OpenPGP key specially crafted for the XMPP use case should be
    created, announced and used.</p>

  </section2>

  <section2 topic='OpenPGP Element and Content Element Design' anchor='openpgp-element-design'>

    <p>The &openpgp; and OpenPGP content elements are container
    elements for arbitrary signed and encrypted data and can thus act
    as building blocks for encrypted data included in Message, IQ and
    Presence stanzas. For example, future specifications may use them
    to implement encrypted versions of &xep0047; or &xep0261;.</p>

    <p>Note that signed OpenPGP messages already contain a timestamp
    as per the OpenPGP specification. OpenPGP content elements
    nevertheless require the 'time' element because not every OpenPGP
    API may provide access to the embedded OpenPGP timestamp.</p>

    <p>The 'rpad' element of the OpenPGP content elements exists to
    prevent length-base side channel attacks.</p>

  </section2>

  <section2 topic='Addressing the Issues and Problems of XEP-0027' anchor='solving-xep0027-issues'>

    <p>This specification addresses all relevant issues of &xep0027;
    (<link url='https://xmpp.org/extensions/xep-0027.html#security'>§
    4</link>, <link
    url='https://xmpp.org/extensions/xep-0027.html#issues'>§
    5</link>). It mitigates replay attacks by including the
    recipient's address and a timestamp in the OpenPGP content
    element<note>Full Replay attack prevention would require a
    counter based approach.</note>. It allows for both, signing and
    encrypting of the element. The scope of the specification was
    deliberately limited to OpenPGP.</p>

    <p>Features like signed presences, which is provided by XEP-0027,
    may be added later on as add-on XEP to this.</p>

  </section2>

  <section2 topic='Not using OpenPGP ASCII Armor' anchor='openpgp-ascii-armor'>

    <p>We decided against OpenPGP ASCII Armor (which contains an
    additional checksum) and in favor for Base64, because
    encoding should be part of the network application rather than the
    crypto layer. Also XMPP, needs no additional error correction of payload.
    In "MIME Security with OpenPGP" (<link
    url='http://tools.ietf.org/html/rfc3156'>&rfc3156;</link>), ASCII Armor
    has only been chosen to be backwards compatible with legacy applications
    supporting non-MIME OpenPGP emails only.</p>

  </section2>

  <section2 topic='OpenPGP User IDs' anchor='openpgp-user-ids'>

    <p>OpenPGP User IDs normally consist of a name - email address pair, e.g.,
    "Juliet &lt;[email protected]&gt;" (&rfc4880; <link
    url='http://tools.ietf.org/html/rfc4880#section-5.11'>§ 5.11</link>).
    For this XEP, we require User IDs of the format "xmpp:[email protected]".
    First, it is required to have at least one User ID indicating the use
    of this OpenPGP key. When doing certification of keys (key signing),
    the partner must know what User ID she actually certifies.
    Second, this format uses the standardized URI from XEP-0147 to indicate
    that this User ID corresponds to a key that is used for XMPP.
    Third, having the Real Name inside provides no additional security
    or guideline if this key should be certified. The XMPP address
    is the only trust anchor here.</p>

    </section2>

</section1>

<section1 topic='Security Considerations' anchor='security'>

  <p>The scope of this XEP is intentionally limited, so that the
  specification just defines way for XMPP entities to discover,
  announce and synchronize OpenPGP keys, and how to exchange signed
  and encrypted data between two or more parties. Everything else is
  outside its scope. For example, how 'secure' the key material is
  protected on the endpoints is up to the implementation.</p>

  <p>And while this XEP specifies a mechanism how to discover and
  retrieve a public key, it does not define how the trust relation to
  this key should be established. Even if key discovery and retrieval
  over XMPP provides a stronger coupling between the possessing entity
  (the XMPP address) and the key, as compared to the OpenPGP keyservers,
  how a XMPP server authenticates a remote server is a server policy,
  which does vary from server to server. Implementation MUST provide a
  way for the user to establish and assign trust to a public key. For
  example by using a QR code shown on the recipient's device screen.</p>

  <p>Besides the protocol defined herein, OpenPGP implementations are
  another big attack surface. Needless to say that the security of
  encrypted data exchanged using this protocol depends on the security
  of the used OpenPGP implementation. It is strongly RECOMMENED to use
  existing implementations instead of writing your own. OpenPGP
  implementations have suffered from various vulnerabilities in the past
  which opened up DoS attack vectors. For example <link
  url='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402'>CVE-2013-4402</link>
  and <link
  url='https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617'>CVE-2014-4717</link>.</p>

</section1>

<section1 topic='IANA Considerations' anchor='iana'>

  <p>This document requires no interaction with &IANA;.</p>

</section1>

<section1 topic='XMPP Registrar Considerations' anchor='registrar'>

  <section2 topic='Protocol Namespaces' anchor='registrar-ns'>

    <p>The &REGISTRAR; includes 'urn:xmpp:openpgp:0' in its registry of protocol namespaces (see &NAMESPACES;).</p>

  </section2>

</section1>

<section1 topic='XML Schema' anchor='schema'>

  <p>TODO: Add after the XEP leaves the 'experimental' state.</p>

</section1>

<section1 topic='Acknowledgements' anchor='acknowledgements'>

  <p>Thanks to Emmanuel Gil Peyrot, Sergei Golovan, Marc Laporte Georg
  Lukas and Adithya Abraham Philip for their feedback.</p>

  <p>The first draft of this specification was worked out and written
  on the wall of the 'Kymera' room in one of Google's buildings by the
  authors, consisting of members of the XMPP Standards Foundation and
  the OpenKeychain project, at the GSOC Mentors Summit 2015. The
  authors would like to thank Google for making it possible by
  bringing the right people together.</p>

</section1>
</xep>
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE xep SYSTEM 'xep.dtd' [
  <!ENTITY signcrypt "&lt;signcrypt/&gt;">
  <!ENTITY sign "&lt;sign/&gt;">
  <!ENTITY crypt "&lt;crypt/&gt;">
  <!ENTITY openpgp "&lt;openpgp/&gt;">
  <!ENTITY payload "&lt;payload/&gt;">
  <!ENTITY rfc3629 "<span class='ref'><link url='http://tools.ietf.org/html/rfc3629'>RFC 3629</link></span> <note>RFC 3629: UTF-8, a transformation format of ISO 10646 &lt;<link url='http://tools.ietf.org/html/rfc3629'>http://tools.ietf.org/html/rfc3629</link>&gt;.</note>" >
  <!ENTITY % ents SYSTEM 'xep.ent'>
%ents;
]>
<?xml-stylesheet type='text/xsl' href='xep.xsl'?>
<xep>
<header>
  <title>OpenPGP for XMPP Instant Messaging</title>
  <abstract>Specifies a OpenPGP for XMPP (XEP-OX) profile for the
  Instant Messaging (IM) use case.</abstract>
  <legal>
    <copyright>This XMPP Extension Protocol is copyright (c) 1999 - 2016 by the XMPP Standards Foundation (XSF).</copyright>
    <permissions>Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the &quot;Specification&quot;), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specification, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or substantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or publisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP 
Standards Foundation.</permissions>
    <warranty>## NOTE WELL: This Specification is provided on an &quot;AS IS&quot; BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. In no event shall the XMPP Standards Foundation or the authors of this Specification be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the Specification or the implementation, deployment, or other use of the Specification. ##</warranty>
    <liability>In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall the XMPP Standards Foundation or any author of this Specification be liable for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising out of the use or inability to use the Specification (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if the XMPP Standards Foundation or such author has been advised of the possibility of such damages.</liability>
    <conformance>This XMPP Extension Protocol has been contributed in full conformance with the XSF's Intellectual Property Rights Policy (a copy of which may be found at &lt;<link url='http://xmpp.org/extensions/ipr-policy.shtml'>http://xmpp.org/extensions/ipr-policy.shtml</link>&gt; or obtained by writing to XSF, P.O. Box 1641, Denver, CO 80201 USA).</conformance>
  </legal>
  <number>xxxx</number>
  <status>ProtoXEP</status>
  <type>Standards Track</type>
  <sig>Standards</sig>
  <approver>Council</approver>
  <dependencies>
    <spec>XMPP Core</spec>
    <spec>XEP-0030</spec>
    <spec>XEP-OX</spec>
  </dependencies>
  <supersedes/>
  <supersededby/>
  <shortname>oxim</shortname>
  <author>
    <firstname>Florian</firstname>
    <surname>Schmaus</surname>
    <email>[email protected]</email>
    <jid>[email protected]</jid>
  </author>
  <author>
    <firstname>Dominik</firstname>
    <surname>Schürmann</surname>
    <email>[email protected]</email>
    <jid>[email protected]</jid>
  </author>
  <author>
    <firstname>Vincent</firstname>
    <surname>Breitmoser</surname>
    <email>[email protected]</email>
    <jid>[email protected]</jid>
  </author>
  <revision>
    <version>0.0.1alpha2</version>
    <date>2016-03-25</date>
    <initials>fs</initials>
    <remark><p>First draft.</p></remark>
  </revision>
</header>

<section1 topic='Introduction' anchor='intro'>

  <p>This XMPP extension protocol specifies a profile of <link
  url='../xep-openpgp/xep-openpgp.html'>OpenPGP for XMPP
  (XEP-OX)</link> for OpenPGP secured Instant Messaging (IM).</p>

  <p>Unlike similar XEPs, e.g. OMEMO, this XEP <em>does not</em>
  provide Forward Secrecy (FS), but as an advantage in return, allows
  users to read their archived conversations (respectively their
  encrypted data) later on. Of course, only as long as they still
  possess the according secret key. FS and being able to decrypt
  archived messages are mutually exclusive, i.e. one can not have
  both. The authors therefore consider this XEP complementary to
  similar ones which also provide end-to-end encryption but with a
  different feature set.</p>

</section1>

<section1 topic='OX Instant Messaging Profile' anchor='ox-im-profile'>

    <section2 topic='Discovering Support' anchor='disco'>

    <p>If an entity supports exchanging OpenPGP encrypted and signed
    instant messages over XMPP, i.e. what is specified herein, it MUST
    advertise that fact by announcing a &xep0030; feature of
    'urn:xmpp:openpgp:im:0'. It thus includes this feature in response
    to a service discovery request.</p>

    <example caption="Service Discovery information request"><![CDATA[
<iq type='get'
    from='[email protected]/balcony'
    to='[email protected]/orchard'
    id='disco1'>
  <query xmlns='http://jabber.org/protocol/disco#info'/>
</iq>]]></example>
  <example caption="Service Discovery information response"><![CDATA[
<iq type='result'
    from='[email protected]/orchard'
    to='[email protected]/balcony'
    id='disco1'>
  <query xmlns='http://jabber.org/protocol/disco#info'>
    ...
    <feature var='urn:xmpp:openpgp:im:0'/>
    ...
  </query>
</iq>]]></example>

    <p>Because of possible downgrade attacks, users should be given an
    option to force the usage of the protocol defined herein no matter
    if the remote announces support or not.</p>

  </section2>

  <section2 topic='OpenPGP Secured Instant Messaging' anchor='openpgp-secured-im'>

    <p>In order to establish a OpenPGP secured IM communication, IM
    clients first need to determine the public key of their
    interlocutor(s). OpenPGP historically provides public keyservers
    which can be used for key retrieval. Additional there are methods
    to store OpenPGP key information in the Domain Name
    System (DNS). This specification does not restrict the mechanism
    of key discovery and retrieval, but compliant clients MUST support
    the public key announcement as described in <link
    url='../xep-openpgp/xep-openpgp.html#announcing-discover-pubkey'>XEP-OX
    § 4</link>.</p>

    <p>After the required public keys have been discovered, XMPP
    clients engage in an OpenPGP secured IM
    conversation by exchanging &openpgp; extension elements. They MUST
    use the &signcrypt; OpenPGP content element specified in <link
    url='../xep-openpgp/xep-openpgp.html#exchange'>XEP-OX §
    3.1</link>.</p>

    <p>The child elements of the OpenPGP content element's &payload;
    can be seen as stanza extension elements which are encrypted and
    signed. After the &openpgp; element and the including &signcrypt;,
    element was verified, they SHOULD be processed similar as if they
    had been direct extension elements of the stanza. For example,
    direct child elements found in &payload; in the context of IM
    could be:</p>

    <ul>
      <li>Message bodies (&rfc6121; § 5.2.3): &lt;body xmlns='jabber:client'/&gt; </li>
      <li>&xep0085;: &lt;active xmlns='http://jabber.org/protocol/chatstates'/&gt;</li>
      <li>&xep0071;: &lt;html xmlns='http://jabber.org/protocol/xhtml-im'/&gt;</li>
    </ul>

    <p>But just as with stanza extension elements, child elements of
    &payload; can be any extension element. The example above uses
    the &lt;body/&gt; element as defined in RFC 6121. Note that it
    uses 'jabber:client' as namespace, but since the same
    &lt;body/&gt; element is also defined in the 'jabber:server'
    namespace, recipients MUST accept both.</p>

  </section2>

  <section2 topic='OpenPGP Key Handling' anchor='openpgp-key-handling'>

    <section3 topic='Choosing Public Keys' anchor='choose-pubkey'>

      <p>Clients MUST expect multiple public keys to be announced for a single remote entity. In this case all keys MUST be used for encryption.</p>

    </section3>

      <section3 topic='OpenPGP Secret Key Synchronization' anchor='openpgp-secret-key-sync'>

      <p>Clients MAY want to use the mechanism in XEP-OX § 5 to
      synchronize their secret key(s) over multiple devices. Thus, they
      should query the user's PEP service for an eventually stored
      encrypted secret key.</p>

    </section3>

  </section2>

</section1>

<section1 topic='Business Rules' anchor='rules'>

  <section2 topic='Always Use &signcrypt;' anchor='signcrypt-im-use-case'>

    <p>Only &signcrypt; MUST be used for the IM
    use case. Encrypted but unsigned messages (&crypt;) do not provide
    an advantage over unencrypted ones since the sender can not be
    verified. As result of this rule, the user interface of
    IM clients implementing the protocol defined herein MUST NOT
    provide an option for the user to select between sign+crypt, sign
    or crypt. This also increases the usability.</p>

  </section2>

  <section2 topic='Provide Hints' anchor='hint-im-use-case'>

    <p>In the IM use case every &MESSAGE; equipped with &openpgp;
    SHOULD include an unencrypted &lt;body/&gt; explaining that the actual
    message is encrypted. Furthermore the message SHOULD contain a
    'store' hint as defined in &xep0334; <link
    url='https://xmpp.org/extensions/xep-0334.html#sect-idp1502160'>§
    4.4</link></p>

    <example caption='An encrypted and signed message with hints.'><![CDATA[
<message to='[email protected]'>
  <body>This message is encrypted using OpenPGP.</body>
  <store xmlns='urn:xmpp:hints'/>
  <openpgp xmlns='urn:xmpp:openpgp:0'>
    BASE64_OPENPGP_MESSAGE_CONTAINING__CONTENT_ELEMENT
  </openpgp>
</message>]]></example>

  </section2>

</section1>

<section1 topic='IANA Considerations' anchor='iana'>

  <p>This document requires no interaction with &IANA;.</p>

</section1>

<section1 topic='XMPP Registrar Considerations' anchor='registrar'>

  <section2 topic='Protocol Namespaces' anchor='registrar-ns'>

    <p>The &REGISTRAR; includes 'urn:xmpp:openpgp:0' in its registry of protocol namespaces (see &NAMESPACES;).</p>

  </section2>

</section1>

<section1 topic='XML Schema' anchor='schema'>

  <p>This XEP does not define a Schema, since it exclusively uses elements from
  XEP-OX and other XEPs.</p>

</section1>

<section1 topic='Acknowledgements' anchor='acknowledgements'>

  <p>Please refer to the <link
  url='../xep-openpgp/xep-openpgp.html#acknowledgements'>Acknowledgements
  section of XEP-OX</link>, since the two XEPs where designed
  together.</p>

</section1>
</xep>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Standards mailing list
Info: http://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: [email protected]
_______________________________________________

Reply via email to